Cyber Security Science : [248] Collection home page

Cyber Security Science

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 248
Issue DateTitleAuthor(s)
2016Layered and hierarchical approach for modelling multidimensional design threatsOjeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
2016Improving Digital Forensics Analysis in Federated Domains through Estimator Analysis and Network Flow OptimizationOjeniyi, Joseph Adebayo; Longe, O. B.; Oguntade, E. S.
2016Enhanced Security Testbed Threat Model Based on Parametric Equation and Multi-Level Design ApproachOjeniyi, Joseph Adebayo; Waziri, Victor Onomza; Aibinu, Abiodun Musa; Inyiama, H. C.
2025Development of a hybridized CNN-BiGRU Framework for detection of website phishing attacksEgigogo, A. R.; Ismaila, Idris; Olalere, Morufu; Abisoye, O. A.; Ojeniyi, Joseph Adebayo
2025An advanced feature engineering approach for sybil attack detection in fog computing environmentShuaib, Maryam; Abdulhamid, Shafii Muhammed; Ojeniyi, Joseph Adebayo; Dauda, U. S.; Ismaila, Idris; Noel, Moses Dogonyaro
2024DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gapsAbdullahi, Aishatu Wabi; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo
2023DDoS attack detection against SDN controller using a single traffic featureAbdullahi, A. W.; Ismaila, Idris; Olaniyi, O. M.; Ojeniyi, Joseph Adebayo; Adebayo, O. S.; Uduimoh, A. A.
2018Security risk assessment in pension fund administration using ARM as a case studySamuel, O; Ojeniyi, Joseph Adebayo; Abdulhamid, Shafii Muhammed
2014Granger Causality Test: A Useful Descriptive Tool for Time Series DataOguntade, Emmanuel; Olanrewaju, S; Ojeniyi, Joseph Adebayo
2024-06-30Development of an Improved Winternitz Hash-based Signature Algorithm for Blockchain Cryptocurrency Transaction Security.Dogonyaro, Noel, M.; Ahmad, S.; Isah, A. O.; Subairu, S. O.
2024-07-27Secure Communication in Wireless Body Area Networks with ECC-Based Key Management and Renewal ProtocolsYusuf, T.; Waziri, V.O; Olalere, M; Noel, M.D
2024-06-30DEVELOPMENT OF AN IMPROVED WINTERNITZ HASH-BASED SIGNATURE ALGORITHM FOR BLOCKCHAIN CRYPTOCURRENCY TRANSACTION SECURITYNoel, M.D; Ahmad, S; Isah, A.O; Subairu, S.O
2024Designing an email header analysis tool for cyber threat intelligence.AbdulAzeez, Hassan T.; Ahmad, Suleiman.; Raji, A; Maliki, D
2012CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENTAhmad, Suleiman
2011-09-07Analyzing Membership Profile Privacy Issues in Online Social NetworksAbdulhamid, Shafi’i Muhammad; Abdulazeez, Hassan T.; Abrahamand, Ochoche; Mohammed, Umar
2010-11-06OPNET IT GURU for Networking Education Nigeria UniversitiesZubair, Suleiman; Ahmad, S; Abdulazeez, H. T; Salihu, Bala A.
2010-11-08Design of a Trapdoor for Password AccessAhmad, Suleiman; Zubair, Suleiman.; Abdulazeez, Hassan. T; Salihu, Bala A.; Idris, L.; Ibrahim, A.
2012-06CRYPTOGRAPHIC MODELING IN SERVICE LEVEL AGREEMENTAhmad, Suleiman
2024-02-08Enhancing Fast Fourier Transform Algorithm for Keystroke Acoustic Emanation Denoising Strategy on Real-Time ScenarioAhmad, Suleiman; Alhassan, John Kolo; Abdulhamid, Shafi'i Muhammad; Zubair, Suleiman
2022-12An Internet of Things (IoT)-based Veterinary Support System for Livestock Skin Disease Health Care using MobileNetV2Maliki, Danlami; Ibrahin, Aliyu; Jinsul, Kim; Emmanuel, Fiyinfoluwa Ogunbase; Ahmad, Suleiman; Ibrahim, Mohammed Abdullahi
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 248